Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How to Threat Hunt for Volt Typhoon Using NDR

Whether they use custom implants for persistence, zero days for initial access, or live off the land (LOTL) to avoid detection, finding a state-sponsored adversary group can be a challenging proposition for defenders. This can be particularly true for adversaries that are sponsored by the People’s Republic of China (PRC). Historically, their focus has been on espionage and intellectual property theft.

Container Security is Hard - Aikido Container Autofix to Make it Easy

Container security starts with your base image. But here’s the catch: In this post, we’ll explore why updating base images is harder than it seems, walk through real examples, and show how you can automate safe, intelligent upgrades without breaking your app.

Fireblocks Enables Web3 Connectivity for Calastone's Industry-First Tokenized Fund Distribution Platform

Fireblocks is now working with Calastone, the largest global funds network, to support Web3 connectivity within Calastone’s Tokenised Distribution solution, a first-of-its-kind solution enabling asset managers to tokenize any fund on Calastone’s network and distribute it across blockchains such as Ethereum and Polygon. Fireblocks is providing secure infrastructure components that enable integration with Web3-native distributors.

Cybercriminals Use Telegram Bots to Exfiltrate Data In Phishing Kit Campaign

KnowBe4 ThreatLabs has identified and analyzed a sophisticated cross-platform phishing campaign that utilizes Telegram as its primary exfiltration channel. The campaign uses a combination of security-themed phishing emails, branded phishing websites to harvest credentials, and Telegram bots to exfiltrate data.

May 12, 2025 Cyber Threat Intelligence Briefing

This week’s briefing covers: Software Supply Chain Attack on Golang Leads to Wiper Malware A supply-chain attack has been discovered that targeted Linux servers through malicious Golang modules, mimicking legitimate modules, that were posted on GitHub. Continued Exploitation of Critical SAP NetWeaver Critical Vulnerability Further to Kroll’s reporting in previous weeks regarding active exploitation of CVE-2025-31324, a critical vulnerability that allows a threat actor to execute code remotely.

External Attack Surface Management Promised Visibility - But Did It Deliver?

External Attack Surface Management (EASM) emerged with a bold promise: to illuminate the dark corners of an organization’s internet-facing infrastructure. It was sold as a panacea for “you don’t know what you don’t know,” offering security leaders the ability to see everything attackers could see. The expectation was straightforward—feed the EASM solution a few IP ranges or domains, and it would map your exposed assets, vulnerabilities, and risks.

Difference Between Fidelis' Deep Session Inspection and Traditional Deep Packet Inspection (DPI)

Deep Packet Inspection (DPI) was once the go-to method for monitoring network traffic, but it now struggles to detect today’s evasive, multi-stage cyberattacks that are spread across multiple channels and hidden deep within payloads. Fragmented visibility, surface-level scanning, and a lack of contextual understanding mean that malicious activity often slips through unnoticed, putting security teams constantly on the back foot.

Context Rich Metadata: Best Practices and Techniques for Enhanced Data Analysis

Are you struggling to make sense of your data files and ensure compliance with ever-changing regulations? Context rich metadata is your solution. By revealing detailed insights like creation dates, modification times, and access history, it not only boosts data analysis but also strengthens governance and compliance. Dive into this article to discover how to effectively implement and manage context rich metadata for enhanced data security and compliance.

RSA Conference 2025: Four Days that Re-Energized My Faith That We Are Making Progress

Walking into Moscone South on Monday morning I felt the familiar RSA buzz—thousands of badges, coffee lines that never end, and animated hallway debates about whether AI will save or sink us. This year the conversations were richer than ever. I was thankful that “Secure by Design” is still gaining traction, and many sessions—whether it was about agentic AI, new software liability proposals, or the talent crisis—had the need for secure software a given.